watchdog: BUG: soft lockup - CPU#1 stuck for 143s! [syz.0.385:7327] Modules linked in: irq event stamp: 12546346 hardirqs last enabled at (12546345): [] irqentry_exit+0x63/0x90 kernel/entry/common.c:357 hardirqs last disabled at (12546346): [] sysvec_apic_timer_interrupt+0xe/0xc0 arch/x86/kernel/apic/apic.c:1049 softirqs last enabled at (12542320): [] __do_softirq kernel/softirq.c:595 [inline] softirqs last enabled at (12542320): [] invoke_softirq kernel/softirq.c:435 [inline] softirqs last enabled at (12542320): [] __irq_exit_rcu+0xf7/0x220 kernel/softirq.c:662 softirqs last disabled at (12542285): [] __do_softirq kernel/softirq.c:595 [inline] softirqs last disabled at (12542285): [] invoke_softirq kernel/softirq.c:435 [inline] softirqs last disabled at (12542285): [] __irq_exit_rcu+0xf7/0x220 kernel/softirq.c:662 CPU: 1 UID: 0 PID: 7327 Comm: syz.0.385 Not tainted 6.13.0-rc3-syzkaller-gd10cafc5d54a #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 RIP: 0010:pv_wait_head_or_lock kernel/locking/qspinlock_paravirt.h:430 [inline] RIP: 0010:__pv_queued_spin_lock_slowpath+0x781/0xdb0 kernel/locking/qspinlock.c:508 Code: ff 42 0f b6 04 2b 84 c0 75 6c 66 c7 84 24 b0 00 00 00 00 01 48 8b 44 24 40 42 0f b6 04 28 84 c0 75 77 41 80 3e 00 74 0c f3 90 <41> ff c4 75 d2 e9 a0 00 00 00 4c 89 f7 be 02 00 00 00 e8 e8 83 3a RSP: 0018:ffffc9000444f7e0 EFLAGS: 00000206 RAX: 0000000000000000 RBX: 1ffff92000889f12 RCX: ffffc9000444f801 RDX: ffffc9000c959000 RSI: 000000000007ffff RDI: 0000000000080000 RBP: ffffc9000444f918 R08: ffffffff942a28bf R09: 1ffffffff2854517 R10: dffffc0000000000 R11: fffffbfff2854518 R12: 00000000ffffc1c4 R13: dffffc0000000000 R14: ffff8880234cb7d8 R15: ffffc9000444f8a0 FS: 00007fe86745b6c0(0000) GS:ffff8880b8700000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000001b30614ff8 CR3: 000000007c9e0000 CR4: 00000000003526f0 DR0: 0000000000000000 DR1: 0000000020000300 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 Call Trace: pv_queued_spin_lock_slowpath arch/x86/include/asm/paravirt.h:584 [inline] queued_spin_lock_slowpath+0x42/0x50 arch/x86/include/asm/qspinlock.h:51 queued_spin_lock include/asm-generic/qspinlock.h:114 [inline] do_raw_spin_lock+0x272/0x370 kernel/locking/spinlock_debug.c:116 spin_lock include/linux/spinlock.h:351 [inline] d_instantiate+0x64/0xa0 fs/dcache.c:1903 alloc_path_pseudo fs/file_table.c:360 [inline] alloc_file_pseudo+0x19e/0x290 fs/file_table.c:372 __anon_inode_getfile fs/anon_inodes.c:109 [inline] __anon_inode_getfd fs/anon_inodes.c:234 [inline] anon_inode_getfd+0xce/0x1e0 fs/anon_inodes.c:269 bpf_prog_load+0x1914/0x20e0 kernel/bpf/syscall.c:2981 __sys_bpf+0x4ee/0x810 kernel/bpf/syscall.c:5794 __do_sys_bpf kernel/bpf/syscall.c:5901 [inline] __se_sys_bpf kernel/bpf/syscall.c:5899 [inline] __x64_sys_bpf+0x7c/0x90 kernel/bpf/syscall.c:5899 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7fe866585d29 Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007fe86745b038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 RAX: ffffffffffffffda RBX: 00007fe866775fa0 RCX: 00007fe866585d29 RDX: 0000000000000094 RSI: 0000000020000840 RDI: 0000000000000005 RBP: 00007fe866601b08 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 0000000000000000 R14: 00007fe866775fa0 R15: 00007ffc003a5438 Sending NMI from CPU 1 to CPUs 0: NMI backtrace for cpu 0 CPU: 0 UID: 0 PID: 7317 Comm: syz.1.382 Not tainted 6.13.0-rc3-syzkaller-gd10cafc5d54a #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 RIP: 0010:validate_chain+0x8e/0x5920 kernel/locking/lockdep.c:3860 Code: 00 00 f0 66 7b 81 48 8d 8c 24 00 01 00 00 48 c1 e9 03 48 b8 f1 f1 f1 f1 00 f2 f2 f2 4a 89 04 21 48 b8 f2 f2 f2 00 f2 f2 f2 00 <4a> 89 44 21 09 4a 89 44 21 11 48 b8 f2 f2 f2 f2 f2 00 00 00 4a 89 RSP: 0018:ffffc900000073a0 EFLAGS: 00000802 RAX: 00f2f2f200f2f2f2 RBX: ffffffff93c1bb08 RCX: 1ffff92000000e94 RDX: 0000000000000001 RSI: ffff888021798b30 RDI: ffff888021798000 RBP: ffffc900000076a0 R08: ffffffff942a2887 R09: 1ffffffff2854510 R10: dffffc0000000000 R11: fffffbfff2854511 R12: dffffc0000000000 R13: ffff888021798000 R14: bc9030c274e7ad79 R15: 0000000000000001 FS: 0000000000000000(0000) GS:ffff8880b8600000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 000000110c33e729 CR3: 00000000604d6000 CR4: 00000000003526f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 Call Trace: __lock_acquire+0x1397/0x2100 kernel/locking/lockdep.c:5226 lock_acquire+0x1ed/0x550 kernel/locking/lockdep.c:5849 rcu_lock_acquire include/linux/rcupdate.h:337 [inline] rcu_read_lock_sched include/linux/rcupdate.h:941 [inline] pfn_valid include/linux/mmzone.h:2048 [inline] __virt_addr_valid+0x1a0/0x530 arch/x86/mm/physaddr.c:65 kasan_addr_to_slab+0xd/0x80 mm/kasan/common.c:37 __kasan_record_aux_stack+0x11/0xc0 mm/kasan/generic.c:529 irq_work_queue_on+0x118/0x260 kernel/irq_work.c:150 rcu_read_unlock_special+0x3f9/0x570 kernel/rcu/tree_plugin.h:686 __rcu_read_unlock+0xa1/0x110 kernel/rcu/tree_plugin.h:437 rcu_read_unlock include/linux/rcupdate.h:882 [inline] trace_call_bpf+0x607/0x8a0 kernel/trace/bpf_trace.c:148 perf_trace_run_bpf_submit+0x82/0x180 kernel/events/core.c:10466 do_perf_trace_preemptirq_template include/trace/events/preemptirq.h:14 [inline] perf_trace_preemptirq_template+0x2d2/0x3f0 include/trace/events/preemptirq.h:14 trace_irq_enable+0xf5/0x120 include/trace/events/preemptirq.h:40 trace_hardirqs_on+0x18/0x40 kernel/trace/trace_preemptirq.c:73 irqentry_exit+0x63/0x90 kernel/entry/common.c:357 asm_sysvec_irq_work+0x1a/0x20 arch/x86/include/asm/idtentry.h:738 RIP: 0010:variable_ffs arch/x86/include/asm/bitops.h:321 [inline] RIP: 0010:handle_softirqs+0x1ef/0x9b0 kernel/softirq.c:549 Code: 00 00 00 45 0f b7 e4 48 c7 c7 00 92 09 8c e8 08 cf 66 0a 65 66 c7 05 a6 0c a2 7e 00 00 e8 49 74 45 00 fb 49 c7 c6 c0 b0 60 8e ff ff ff ff 41 0f bc c4 41 89 c7 41 ff c7 0f 84 0a 04 00 00 44 RSP: 0018:ffffc90000007e20 EFLAGS: 00000282 RAX: c56e254f0f77b300 RBX: ffffc90000007ee0 RCX: ffffffff817b275a RDX: dffffc0000000000 RSI: ffffffff8c0a9760 RDI: ffffffff8c5faf20 RBP: ffffc90000007f50 R08: ffffffff942a28bf R09: 1ffffffff2854517 R10: dffffc0000000000 R11: fffffbfff2854518 R12: 0000000000000200 R13: 0000000000000000 R14: ffffffff8e60b0c0 R15: 1ffff110042f3000 __do_softirq kernel/softirq.c:595 [inline] invoke_softirq kernel/softirq.c:435 [inline] __irq_exit_rcu+0xf7/0x220 kernel/softirq.c:662 irq_exit_rcu+0x9/0x30 kernel/softirq.c:678 instr_sysvec_irq_work arch/x86/kernel/irq_work.c:17 [inline] sysvec_irq_work+0xa3/0xc0 arch/x86/kernel/irq_work.c:17 asm_sysvec_irq_work+0x1a/0x20 arch/x86/include/asm/idtentry.h:738 RIP: 0010:rcu_read_unlock_special+0x88/0x570 kernel/rcu/tree_plugin.h:693 Code: f1 f1 f1 00 f2 f2 f2 49 89 04 14 66 41 c7 44 14 09 f3 f3 41 c6 44 14 0b f3 65 44 8b 3d f9 e3 7d 7e 41 f7 c7 00 00 f0 00 74 49 <48> c7 44 24 20 0e 36 e0 45 4a c7 04 22 00 00 00 00 66 42 c7 44 22 RSP: 0018:ffffc90002fd7a80 EFLAGS: 00000206 RAX: c56e254f0f77b300 RBX: 1ffff920005faf58 RCX: ffffffff817b275a RDX: dffffc0000000000 RSI: ffffffff8c0a9760 RDI: ffffffff8c5faf20 RBP: ffffc90002fd7b58 R08: ffffffff942a28bf R09: 1ffffffff2854517 R10: dffffc0000000000 R11: fffffbfff2854518 R12: 1ffff920005faf54 R13: ffff888021798460 R14: ffffc90002fd7ac0 R15: ffffffff8e93c800 __rcu_read_unlock+0xa1/0x110 kernel/rcu/tree_plugin.h:437 dput+0x197/0x2b0 fs/dcache.c:866 __fput+0x5ba/0xa50 fs/file_table.c:458 task_work_run+0x24f/0x310 kernel/task_work.c:239 exit_task_work include/linux/task_work.h:43 [inline] do_exit+0xa2f/0x28e0 kernel/exit.c:938 do_group_exit+0x207/0x2c0 kernel/exit.c:1087 __do_sys_exit_group kernel/exit.c:1098 [inline] __se_sys_exit_group kernel/exit.c:1096 [inline] __x64_sys_exit_group+0x3f/0x40 kernel/exit.c:1096 x64_sys_call+0x26a8/0x26b0 arch/x86/include/generated/asm/syscalls_64.h:232 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7f79f9f85d29 Code: Unable to access opcode bytes at 0x7f79f9f85cff. RSP: 002b:00007ffd3adaa8f8 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7 RAX: ffffffffffffffda RBX: 000000000000000b RCX: 00007f79f9f85d29 RDX: 00007f79f9f3d347 RSI: 0000000000000000 RDI: 000000000000000b RBP: 00007f79fa17624c R08: 00007ffd3adaada7 R09: 000000000000000b R10: 00007f79fa175fa0 R11: 0000000000000246 R12: 0000000000000003 R13: 00007f79fa176240 R14: 0000000000000004 R15: 0000000000000ebe